Your browser does not support JavaScript!

Extending the Håstad attack to LUC

Extending the Håstad attack to LUC

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The authors show that the attack of Håstad on broadcast messages using the RSA cryptosystem extends to the case where the public keys are different, and that the attack is also applicable to the LUC system, with the same security parameters.


    1. 1)
      • Solving simultaneous modular equations of low degree. SIAM J. Comput. , 2 , 336 - 341
    2. 2)
      • R.L. Rivest , A. Shamir , L. Adleman . A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM , 2 , 120 - 126
    3. 3)
      • P. Smith , M.J.J. Lennon . LUC - a new public-key system. IFIP Trans. A, Comput. Sci. Technol. , 103 - 117
    4. 4)
      • Håstad, J.: `On using RSA with low exponent in a public key network', Advances in cryptology - CRYPTO'85, 1986, 218, p. 404–408Lecture notes in computer science, .
    5. 5)
      • S. Murphy . Comment: Remarks on the LUC public key system. Electron. Lett. , 7 , 558 - 559
    6. 6)
      • P. Smith . LUC public key encryption: a secure alternative to RSA. Dr Dobb's J. , 1 , 44 - 49

Related content

This is a required field
Please enter a valid email address